Skip to content
mimi

Cyber Security Engineer at Rampant Technologies Oakton, VA

Rampant Technologies

Oakton · On-site Full-time Senior 1w ago

About the role

Cyber Security Engineer – Rampant Technologies (Oakton, VA)

Job Summary

A Rampant Technologies Cybersecurity Engineer (CSE) is a key resource that is a part of the Rampant team reporting to the Principal Engineer overseeing the CSE team to deliver innovative Cyber Security solutions that are in alignment with the company’s goals.

Essential Duties & Responsibilities

  • SME on problem identification, diagnosis, and resolution of problems
  • Develop best practices for processes and standards that will better the system
  • Perform vulnerability assessments using standardized tools (Nessus, DISA STIGs) and configuration updates as required to comply with security requirements.
  • Track and fulfill liens associated with A&A activities as documented in the Plan of Actions and Milestones.
  • Perform hardening of ops systems, COTS and open-source product
  • Validate best practices in Penetration testing, Configuration analysis, and Security
  • Prepare comprehensive security assessment testing documentation to validate applied security controls in support of Assessment and Authorization (A&A) testing. Generating/maintaining security accreditation artifacts associated with RMF process to include, but not limited to Security Requirements Traceability Matrix, Security Plans, Certification Test Plans, Continuous Monitoring Plans)2
  • Perform timely updates in accreditation DB
  • Provide technical guidance focused on information security architecture.

Key Skills, Education & Experience

  • Minimum of eight (3) years’ relevant experience as a Cybersecurity Engineer in programs and contracts of similar scope, type, and complexity is required; ideally three (3+) years of direct experience in the same level/grade for like role.
  • Techno functional knowledge of/experience in:
    • Execution of the Assessment & Authorization (A&A process) in accordance with government requirements (e.g. ICD-503)
    • Information systems security and continuous monitoring practices and how to assess their effectiveness per NIST SP 800-53 and NIST SP 800-53A.
    • DCID 6/3, ICD 503, CNSSI 1253, NIST SP 800-53, NIST SP 800-53A, NIST SP 800-37, and security controls assessment criteria/procedures
    • Integrity, availability, authentication, and non-repudiation concepts
    • IT security principles and methods (e.g., firewalls, demilitarized zones, encryption)
    • Network access, identity, and access management (e.g., public key infrastructure [PKI])
    • Security system design tools, methods, and techniques
    • Relevant laws, policies, procedures, or governance as they relate to work that may impact critical infrastructure.
    • TCP/IP networking technologies, Linux account administration, Linux folder permissions, Patch Management best practices on Operating Systems and applications, known vulnerabilities associated with Windows and Linux platforms.
    • Continuous monitoring processes as outlined in NIST SP 800-137 appropriate for systems, leveraging existing tools, efforts, and incorporating new automation techniques.
    • Virtualization technologies (e.g. VMWare, Docker)
    • OSI model and how specific devices and protocols interoperate, including knowledge of protocols, and services for common network traffic
    • DoD/IC system security control requirements
    • XACTA and SNOW
    • Security testing and penetration tools that include Assured Compliance Assessment Solution (ACAS), Wireshark, Retina, Tripwire, etc…
    • Hands on experience and proficiency with the full Microsoft Office Suite and tools such as Microsoft Project, Microsoft Visio
    • Self-starter/motivator and

Certifications and Clearance

  • Must have certifications (certifications with * indicate willing to hire if certification is within 3-6 months of finalizing):
  • Active TS/SCI w/ Poly clearance required
  • Current certification compliant with DoD 8570 IAM or IAT level 3 OR obtain certification within 6 months of hire and maintain certification throughout employment.
  • MUST meet DoD 8570 IAT Level III requirements
  • IAT Level II Certifications (Security+ or equivalent)

Requirements

  • Execution of the Assessment & Authorization (A&A process) in accordance with government requirements (e.g. ICD-503)
  • Information systems security and continuous monitoring practices and how to assess their effectiveness per NIST SP 800-53 and NIST SP 800-53A
  • DCID 6/3, ICD 503, CNSSI 1253, NIST SP 800-53, NIST SP 800-53A, NIST SP 800-37, and security controls assessment criteria/procedures
  • Integrity, availability, authentication, and non-repudiation concepts
  • IT security principles and methods (e.g., firewalls, demilitarized zones, encryption)
  • Network access, identity, and access management (e.g., public key infrastructure [PKI])
  • Security system design tools, methods, and techniques
  • Relevant laws, policies, procedures, or governance as they relate to work that may impact critical infrastructure
  • TCP/IP networking technologies, Linux account administration, Linux folder permissions, Patch Management best practices on Operating Systems and applications, known vulnerabilities associated with Windows and Linux platforms
  • Continuous monitoring processes as outlined in NIST SP 800-137 appropriate for systems, leveraging existing tools, efforts, and incorporating new automation techniques
  • DoD/IC system security control requirements
  • Hands on experience and proficiency with the full Microsoft Office Suite and tools such as Microsoft Project, Microsoft Visio

Responsibilities

  • SME on problem identification, diagnosis, and resolution of problems
  • Develop best practices for processes and standards that will better the system
  • Perform vulnerability assessments using standardized tools (Nessus, DISA STIGs) and configuration updates as required to comply with security requirements
  • Track and fulfill liens associated with A&A activities as documented in the Plan of Actions and Milestones
  • Perform hardening of ops systems, COTS and open-source product
  • Validate best practices in Penetration testing, Configuration analysis, and Security
  • Prepare comprehensive security assessment testing documentation to validate applied security controls in support of Assessment and Authorization (A&A) testing
  • Generate/maintain security accreditation artifacts associated with RMF process to include, but not limited to Security Requirements Traceability Matrix, Security Plans, Certification Test Plans, Continuous Monitoring Plans
  • Perform timely updates in accreditation DB
  • Provide technical guidance focused on information security architecture

Skills

ACASCNSSI 1253DISA STIGsDockerICD 503LinuxMicrosoft OfficeMicrosoft ProjectMicrosoft VisioNessusNIST SP 800-137NIST SP 800-37NIST SP 800-53NIST SP 800-53AOSI modelPKIRMFSecurity+SNOWTCP/IPTripwireVMWareWiresharkWindowsXACTA

Don't send a generic resume

Paste this job description into Mimi and get a resume tailored to exactly what the hiring team is looking for.

Get started free